Ownership-based data security transaction method and system
A data security and transaction method technology, applied in the field of information security technology and data transaction, can solve problems affecting personal interests, corporate interests, social stability, national security, illegal data transactions, unclear data ownership, etc., to avoid branch transactions The effect of information loss and protection of interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0034] A data security transaction method based on ownership, comprising the following steps:
[0035] A. Encrypt the ownership of the data to be traded provided by the data owner;
[0036] B. Extract the characteristic information of the data to be traded, register and publish;
[0037] C. Negotiate the transaction when receiving the data transaction application and generate a transaction contract according to the content of the negotiation;
[0038] D. After the transaction payment or transaction confirmation, authorize the ownership of the data to the data applicant and record the process;
[0039] E. Record the ownership authorization process of transactions and the use process of transaction data;
[0040] F. After the transaction is successful, judge whether the data has multiple ownerships. If it is a single ownership, it will end; if there are multiple data ownerships, the benefits obtained from the data exchange will be distributed to multiple data owners according ...
Embodiment 2
[0042] Based on the principle of Embodiment 1, this embodiment refines the foregoing embodiments in detail.
[0043] A. Encrypt and store the transaction data provided by the data owner; the storage location can be selected according to the personal wishes of the data owner. In this step, the data may be data, funds or virtual currency, etc. The encryption method can be based on CA / PKI. According to the size of the data, asymmetric key algorithm can be used to encrypt data or symmetric key algorithm + asymmetric key algorithm to encrypt data. The data owner's public key is used to encrypt data, and the private key is provided by Data owner saves. Specifically, if the amount of data is small, an asymmetric key algorithm is used to encrypt the data; when the amount of data is large, the data is encrypted using a symmetric key algorithm + an asymmetric key algorithm. Such as AES combined with RSA algorithm.
[0044] B. The feature information of the transaction data is registe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com